Journal articles on the topic 'Security devices'

To see the other types of publications on this topic, follow the link: Security devices.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security devices.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Al Reshan, Mana Saleh. "IoT-based Application of Information Security Triad." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 24 (December 21, 2021): 61–76. http://dx.doi.org/10.3991/ijim.v15i24.27333.

Full text
Abstract:
Information Security is the foremost concern for IoT (Internet of things) devices and applications. Since the advent of IoT, its applications and devices have experienced an exponential increase in numerous applications which are utilized. Nowadays we people are becoming smart because we started using smart devices like a smartwatch, smart TV, smart home appliances. These devices are part of the IoT devices. The IoT device differs widely in capacity storage, size, computational power, and supply of energy. With the rapid increase of IoT devices in different IoT fields, information security, and privacy are not addressed well. Most IoT devices having constraints in computational and operational capabilities are a threat to security and privacy, also prone to cyber-attacks. This study presents a CIA triad-based information security implementation for the four-layer architecture of the IoT devices. An overview of layer-wise threats to the IoT devices and finally suggest CIA triad-based security techniques for securing the IoT devices.
APA, Harvard, Vancouver, ISO, and other styles
2

Kroleski, Steven L., and William A. Bottiglieri. "Leases As Security Devices." Journal of Business Case Studies (JBCS) 4, no. 4 (June 28, 2011): 45. http://dx.doi.org/10.19030/jbcs.v4i4.4775.

Full text
Abstract:
Leases have priority over mortgages and other security devices if they were entered into prior to the security devices and if the leases were duly recorded, or in the alternative, the lessee can prove that the holder of the security device had actual notice of the leases existence. Which means, that should the creditor seek to foreclose on the premises, the lessee has a protected right to remain on the premises pursuant to the terms of the lease. This holds true for a subsequent purchaser of the property either at the foreclosure sale or thereafter.
APA, Harvard, Vancouver, ISO, and other styles
3

Choudhary, Yash, B. Umamaheswari, and Vijeta Kumawat. "A Study of Threats, Vulnerabilities and Countermeasures: An IoT Perspective." Shanlax International Journal of Arts, Science and Humanities 8, no. 4 (April 1, 2021): 39–45. http://dx.doi.org/10.34293/sijash.v8i4.3583.

Full text
Abstract:
IoT or the Internet of things refers to all the physical devices connected to the internet. IoT consists of computing devices that are web-enabled and have the capability of sensing, collecting, and sending data. IoT provides the ability to remote control appliances and has many more applications. Since IoT is becoming a big part of society, it is necessary to ensure that these devices provide adequate security measures. This paper discusses various security issues in IoT systems like threats, vulnerabilities and some countermeasures which can be used to provide some security. Developing a secure device is now more important than ever, as with the increase in digitization, much of a user’s data is available on these devices. Securing data is a primary concern in any system, as internet-enabled devices are easier to hack. The idea of this paper is to spread awareness and improve the security of IoT devices.
APA, Harvard, Vancouver, ISO, and other styles
4

Zhu, Li Jue, Wen Tao Zhao, Hui Jun Wu, Yong Liu, and Zhao Ming Hu. "Prototype Design of Self-Securing Portable Storage Device." Applied Mechanics and Materials 347-350 (August 2013): 3911–14. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.3911.

Full text
Abstract:
Embedding the security mechanism into the device is the core of self-securing, on purpose to provide the device with the ability of self-defense. Currently, security of portable storage device is commonly depends on the host, which makes the data easy to be attacked or stolen. Researches on self-securing mechanism on portable device are few. In order to improve the safety of those devices, we proposed the prototype design of self-securing portable storage device based on the framework of ARM+Linux. Combined with access control, intrusion detection based on storage and data encryption/decryption, it can protect data availability, integrity and confidentiality effectively. Since we have expanded researches on self-securing mechanism of portable storage devices, this prototype design is promising to be one kind of trend of intelligent storage.
APA, Harvard, Vancouver, ISO, and other styles
5

Kurt Peker, Yeṣem, Gabriel Bello, and Alfredo J. Perez. "On the Security of Bluetooth Low Energy in Two Consumer Wearable Heart Rate Monitors/Sensing Devices." Sensors 22, no. 3 (January 27, 2022): 988. http://dx.doi.org/10.3390/s22030988.

Full text
Abstract:
Since its inception in 2013, Bluetooth Low Energy (BLE) has become the standard for short-distance wireless communication in many consumer devices, as well as special-purpose devices. In this study, we analyze the security features available in Bluetooth LE standards and evaluate the features implemented in two BLE wearable devices (a Fitbit heart rate wristband and a Polar heart rate chest wearable) and a BLE keyboard to explore which security features in the BLE standards are implemented in the devices. In this study, we used the ComProbe Bluetooth Protocol Analyzer, along with the ComProbe software to capture the BLE traffic of these three devices. We found that even though the standards provide security mechanisms, because the Bluetooth Special Interest Group does not require that manufacturers fully comply with the standards, some manufacturers fail to implement proper security mechanisms. The circumvention of security in Bluetooth devices could leak private data that could be exploited by rogue actors/hackers, thus creating security, privacy, and, possibly, safety issues for consumers and the public. We propose the design of a Bluetooth Security Facts Label (BSFL) to be included on a Bluetooth/BLE enabled device’s commercial packaging and conclude that there should be better mechanisms for informing users about the security and privacy provisions of the devices they acquire and use and to educate the public on protection of their privacy when buying a connected device.
APA, Harvard, Vancouver, ISO, and other styles
6

Myridakis, Dimitrios, Georgios Spathoulas, Athanasios Kakarountas, and Dimitrios Schinianakis. "Smart Devices Security Enhancement via Power Supply Monitoring." Future Internet 12, no. 3 (March 10, 2020): 48. http://dx.doi.org/10.3390/fi12030048.

Full text
Abstract:
The continuous growth of the number of Internet of Things (IoT) devices and their inclusion to public and private infrastructures has introduced new applciations to the market and our day-to-day life. At the same time, these devices create a potential threat to personal and public security. This may be easily understood either due to the sensitivity of the collected data, or by our dependability to the devices’ operation. Considering that most IoT devices are of low cost and are used for various tasks, such as monitoring people or controlling indoor environmental conditions, the security factor should be enhanced. This paper presents the exploitation of side-channel attack technique for protecting low-cost smart devices in an intuitive way. The work aims to extend the dataset provided to an Intrusion Detection Systems (IDS) in order to achieve a higher accuracy in anomaly detection. Thus, along with typical data provided to an IDS, such as network traffic, transmitted packets, CPU usage, etc., it is proposed to include information regarding the device’s physical state and behaviour such as its power consumption, the supply current, the emitted heat, etc. Awareness of the typical operation of a smart device in terms of operation and functionality may prove valuable, since any deviation may warn of an operational or functional anomaly. In this paper, the deviation (either increase or decrease) of the supply current is exploited for this reason. This work aimed to affect the intrusion detection process of IoT and proposes for consideration new inputs of interest with a collateral interest of study. In parallel, malfunction of the device is also detected, extending this work’s application to issues of reliability and maintainability. The results present 100% attack detection and this is the first time that a low-cost security solution suitable for every type of target devices is presented.
APA, Harvard, Vancouver, ISO, and other styles
7

Kaushal, Rajesh Kumar, Naveen Kumar, Shilpi Singhal, Simranjeet Singh, and Harmaninderjit Singh. "Locking Device for Physical Protection of Electronic Devices." ECS Transactions 107, no. 1 (April 24, 2022): 1769–79. http://dx.doi.org/10.1149/10701.1769ecst.

Full text
Abstract:
The physical security of electronic devices like laptops and tablets is vital as these devices carry confidential data which cannot be compromised. Data security can be provided through a number of innovative ways. The first line of defense is physical security. As far as physical security is concerned, there has been very little development to date. This research is focusing on the physical security of data storage devices. To provide physical security to laptop devices this work proposes a locking assembly for various electronic devices like laptops and tablets. The assembly includes a frame adapted to be coupled to a base of the one or more electronic devices. This locking assembly ensures the safety of devices against any possible theft or unauthorized usage. The design of this locking assembly presents a cost effective, easily available, and simpler to assemble, easy to manufacture and durable solution to the theft problems. A detailed analysis of the proposed design has been conducted which provided an insight of efficiency and usability of the locking mechanism. The mass properties of the model have been computed after assigning the standard material (aluminium) to various components. The mass of the locking assembly has been estimated as 0.5 Kg and the volume is 0.002 cubic meters.
APA, Harvard, Vancouver, ISO, and other styles
8

Sharma, Amritesh Kumar, Arun Kumar Singh, and Pankaj P. Singh. "Security in Android." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 12, no. 10 (April 25, 2014): 3990–96. http://dx.doi.org/10.24297/ijct.v12i10.2983.

Full text
Abstract:
New technologies have always created new areas of concern for information security teams. Usually it provides time for the development of effective security controls. The rapid growth of the smartphone in market and the use of these devices for so many sensitive data have led to the emergence of security threat. A malicious user or malware on a device can create a number of risks for an organization, and so the fact that these devices are not necessarily connected does not translate to a lack of security risks. This paper will discuss why it is important to secure an Android device, what some of the potential vulnerabilities are, and security measures that can be introduced to provide a baseline of security of data on Google’s mobile OS
APA, Harvard, Vancouver, ISO, and other styles
9

Alamer, A., and B. Soh. "FEATHER: A Proposed Lightweight Protocol for Mobile Cloud Computing Security." Engineering, Technology & Applied Science Research 10, no. 4 (August 16, 2020): 6116–25. http://dx.doi.org/10.48084/etasr.3676.

Full text
Abstract:
Ensuring security for lightweight cryptosystems in mobile cloud computing is challenging. Encryption speed and battery consumption must be maintained while securing mobile devices, the server, and the communication channel. This study proposes a lightweight security protocol called FEATHER which implements MICKEY 2.0 to generate keystream in the cloud server and to perform mobile device decryption and encryption. FEATHER can be used to implement secure parameters and lightweight mechanisms for communication among mobile devices and between them and a cloud server. FEATHER is faster than the existing CLOAK protocol and consumes less battery power. FEATHER also allows more mobile devices to communicate at the same time during very short time periods, maintain security for more applications with minimum computation ability. FEATHER meets mobile cloud computing requirements of speed, identity, and confidentiality assurances, compatibility with mobile devices, and effective communication between cloud servers and mobile devices using an unsafe communication channel.
APA, Harvard, Vancouver, ISO, and other styles
10

A. Harris, Mark, and Karen P. Patten. "Mobile device security considerations for small- and medium-sized enterprise business mobility." Information Management & Computer Security 22, no. 1 (March 4, 2014): 97–114. http://dx.doi.org/10.1108/imcs-03-2013-0019.

Full text
Abstract:
Purpose – This paper's purpose is to identify and accentuate the dilemma faced by small- to medium-sized enterprises (SMEs) who use mobile devices as part of their mobility business strategy. While large enterprises have the resources to implement emerging security recommendations for mobile devices, such as smartphones and tablets, SMEs often lack the IT resources and capabilities needed. The SME mobile device business dilemma is to invest in more expensive maximum security technologies, invest in less expensive minimum security technologies with increased risk, or postpone the business mobility strategy in order to protect enterprise and customer data and information. This paper investigates mobile device security and the implications of security recommendations for SMEs. Design/methodology/approach – This conceptual paper reviews mobile device security research, identifies increased security risks, and recommends security practices for SMEs. Findings – This paper identifies emerging mobile device security risks and provides a set of minimum mobile device security recommendations practical for SMEs. However, SMEs would still have increased security risks versus large enterprises who can implement maximum mobile device security recommendations. SMEs are faced with a dilemma: embrace the mobility business strategy and adopt and invest in the necessary security technology, implement minimum precautions with increased risk, or give up their mobility business strategy. Practical implications – This paper develops a practical list of minimum mobile device security recommendations for SMEs. It also increases the awareness of potential security risks for SMEs from mobile devices. Originality/value – This paper expands previous research investigating SME adoption of computers, broadband internet-based services, and Wi-Fi by adding mobile devices. It describes the SME competitive advantages from adopting mobile devices for enterprise business mobility, while accentuating the increased business risks and implications for SMEs.
APA, Harvard, Vancouver, ISO, and other styles
11

Foley, Patricia G., Kathleen Hargiss, Caroline Howard, and Anne Pesanvento. "Security Measures in IoT Devices, Including Wireless Medical Devices." International Journal of Cyber-Physical Systems 3, no. 1 (January 1, 2021): 25–36. http://dx.doi.org/10.4018/ijcps.2021010102.

Full text
Abstract:
The exponential growth in global adoption of the internet of things (IoT) has resulted in increasing challenges to secure devices against the rapid escalation of malicious users and external attacks. Security of IoT devices is particularly critical in the medical sector, where data breaches have become common in recent years at healthcare facilities, medical laboratories, and medical insurance companies. The phenomenological study focused on the experiences of users of IoT devices and the adoption of effective security measures in IoT devices, especially wireless medical devices. The results from this research study indicated that there was a need for policymakers to be more aware of the security issues that plague some IoT devices, including the need for training to detect potential breaches and cybersecurity aberrations, improved features for protection of devices, and better password security. The study concludes with recommendations for policymakers and device manufacturers.
APA, Harvard, Vancouver, ISO, and other styles
12

Mtetwa, Njabulo Sakhile, Paul Tarwireyi, Cecilia Nombuso Sibeko, Adnan Abu-Mahfouz, and Matthew Adigun. "Blockchain-Based Security Model for LoRaWAN Firmware Updates." Journal of Sensor and Actuator Networks 11, no. 1 (January 7, 2022): 5. http://dx.doi.org/10.3390/jsan11010005.

Full text
Abstract:
The Internet of Things (IoT) is changing the way consumers, businesses, and governments interact with the physical and cyber worlds. More often than not, IoT devices are designed for specific functional requirements or use cases without paying too much attention to security. Consequently, attackers usually compromise IoT devices with lax security to retrieve sensitive information such as encryption keys, user passwords, and sensitive URLs. Moreover, expanding IoT use cases and the exponential growth in connected smart devices significantly widen the attack surface. Despite efforts to deal with security problems, the security of IoT devices and the privacy of the data they collect and process are still areas of concern in research. Whenever vulnerabilities are discovered, device manufacturers are expected to release patches or new firmware to fix the vulnerabilities. There is a need to prioritize firmware attacks, because they enable the most high-impact threats that go beyond what is possible with traditional attacks. In IoT, delivering and deploying new firmware securely to affected devices remains a challenge. This study aims to develop a security model that employs Blockchain and the InterPlanentary File System (IPFS) to secure firmware transmission over a low data rate, constrained Long-Range Wide Area Network (LoRaWAN). The proposed security model ensures integrity, confidentiality, availability, and authentication and focuses on resource-constrained low-powered devices. To demonstrate the utility and applicability of the proposed model, a proof of concept was implemented and evaluated using low-powered devices. The experimental results show that the proposed model is feasible for constrained and low-powered LoRaWAN devices.
APA, Harvard, Vancouver, ISO, and other styles
13

Buenrostro, Erick, Daniel Cyrus, Tra Le, and Vahid Emamian. "Security of IoT Devices." Journal of Cyber Security Technology 2, no. 1 (January 2, 2018): 1–13. http://dx.doi.org/10.1080/23742917.2018.1474592.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Goto, Ren, Taiki Yoshikawa, Hijiri Komura, Kazushige Matama, Chihiro Nishiwaki, and Katsuhiro Naito. "Design and Basic Evaluation of Virtual IPv4-based CYPHONIC adapter." Journal of Systemics, Cybernetics and Informatics 20, no. 3 (June 2022): 55–63. http://dx.doi.org/10.54808/jsci.20.03.55.

Full text
Abstract:
The rapid spread of cloud services and the Internet of Things (IoT) leads to a request for secure communication between devices, called zero-trust security. However, security tends to be a low priority compared to the designated service because zero-trust security requires security knowledge. Therefore, a secure communication framework for developers’ service development process is essential as the security measures. The authors have developed CYber PHysical Overlay Network over Internet Communication (CYPHONIC) for secure end-to-end communication between devices. Since the CYPHONIC provides secure communication, it also performs as the secure communication framework. The current implementation requires installing the device program into the end devices to join our overlay network. However, it should support general devices such as embedded devices or dedicated service servers even if they refuse to install the additional program. This paper proposes a new technology to support these general devices without installing the device program into the devices. We developed a CYPHONIC adapter to provide secure communication to general devices. It shows that general devices can communicate over the overlay network through the proposed CYPHONIC adapter.
APA, Harvard, Vancouver, ISO, and other styles
15

Alam, Tanweer, and Mohamed Benaida. "CICS: Cloud–Internet Communication Security Framework for the Internet of Smart Devices." International Journal of Interactive Mobile Technologies (iJIM) 12, no. 6 (October 29, 2018): 74. http://dx.doi.org/10.3991/ijim.v12i6.6776.

Full text
Abstract:
<p class="0abstract">The internet of smart devices is a network of intelligent gadgets with sensors, programs, Wi-Fi and communication network connections. These devices store the data in cloud and process data outside the device using the proposed Cloud-Internet communication framework. These devices can communicate with other devices using the proposed framework. However, there are many challenges for communication security among the internet of smart devices. The Cloud can store the device data with security, reliability, privacy and service availability. The communication Security has been raised as one of the most critical issues of cloud computing where resolving such an issue would result in a constant growth in the use and popularity of cloud computing. Our purpose of this study is to create a framework for providing the communication security among smart devices network for the internet of things using cloud computing. Our main contribution links a new study for providing communication security for the internet of smart devices using the cloud-Internet framework. This study can be helpful for communication security problem in the framework of the Internet of Things. The proposed study generates a new framework for solving the issue of communication security among internet of smart devices.</p>
APA, Harvard, Vancouver, ISO, and other styles
16

Zhu, Ruijin, Baofeng Zhang, Yu-an Tan, Jinmiao Wang, and Yueliang Wan. "Determining the Image Base of Smart Device Firmware for Security Analysis." Wireless Communications and Mobile Computing 2020 (December 22, 2020): 1–12. http://dx.doi.org/10.1155/2020/8899193.

Full text
Abstract:
The authorization mechanism of smart devices is mainly implemented by firmware, yet many smart devices have security issues about their firmware. Limited research has focused on securing the firmware of smart devices, although increasingly more smart devices are used to deal with the very sensitive applications, activities, and data of users. Thus, research on smart device firmware security is of growing importance. Disassembly is a common method for evaluating the security of authorization mechanisms. When disassembling firmware, the processor type of the running environment and the image base of the firmware should first be determined. In general, the processor type can be obtained by tearing down the device or consulting the product manual. However, it is not easy to determine the image base of firmware. Since the processors of many smart devices are ARM architectures, in this paper, we focus on firmware under the ARM architecture and propose an automated method for determining the image base. By studying the storage law of the jump table in the firmware of ARM-based smart devices, we propose an algorithm, named determining the image base by searching jump tables (DBJT), to determine the image base. The experimental results indicate that the proposed method can successfully determine the image base of firmware, which stores the absolute address in the jump table.
APA, Harvard, Vancouver, ISO, and other styles
17

Lima, António, Luis Rosa, Tiago Cruz, and Paulo Simões. "A Security Monitoring Framework for Mobile Devices." Electronics 9, no. 8 (July 25, 2020): 1197. http://dx.doi.org/10.3390/electronics9081197.

Full text
Abstract:
Quite often, organizations are confronted with the burden of managing mobile device assets, requiring control over installed applications, security, usage profiles or customization options. From this perspective, the emergence of the Bring Your Own Device (BYOD) trend has aggravated the situation, making it difficult to achieve an adequate balance between corporate regulations, freedom of usage and device heterogeneity. Moreover, device and information protection on mobile ecosystems are quite different from securing other device assets such as laptops or desktops, due to their specific characteristics and limitations—quite often, the resource overhead associated with specific security mechanisms is more important for mobile devices than conventional computing platforms, as the former frequently have comparatively less computing capabilities and more strict power management policies. This paper presents an intrusion and anomaly detection framework specifically designed for managed mobile device ecosystems, that is able to integrate into mobile device and management frameworks for complementing conventional intrusion detection systems. In addition to presenting the reference architecture for the proposed framework, several implementation aspects are also analyzed, based on the lessons learned from developing a proof-of-concept prototype that was used for validation purposes.
APA, Harvard, Vancouver, ISO, and other styles
18

Singh, Anuj Kumar, and B. D. K. Patro. "Security of Low Computing Power Devices: A Survey of Requirements, Challenges & Possible Solutions." Cybernetics and Information Technologies 19, no. 1 (March 1, 2019): 133–64. http://dx.doi.org/10.2478/cait-2019-0008.

Full text
Abstract:
Abstract Security has been a primary concern in almost all areas of computing and for the devices that are low on computing power it becomes more important. In this paper, a new class of computing device termed as Low Computing Power Device (LCPD) has been defined conceptually. The paper brings out common attributes, security requirements and security challenges of all kinds of low computing power devices in one place so that common security solutions for these can be designed and implemented rather than doing this for each individual device type. A survey of existing recent security solutions for different LCPDs hasve been presented here. This paper has also provided possible security solutions for LCPDs which include identification of countermeasures against different threats and attacks on these devices, and choosing appropriate cryptographic mechanism for implementing the countermeasures efficiently.
APA, Harvard, Vancouver, ISO, and other styles
19

Nemec Zlatolas, Lili, Nataša Feher, and Marko Hölbl. "Security Perception of IoT Devices in Smart Homes." Journal of Cybersecurity and Privacy 2, no. 1 (February 14, 2022): 65–74. http://dx.doi.org/10.3390/jcp2010005.

Full text
Abstract:
IoT devices are used frequently in smart homes. To better understand how users perceive the security of IoT devices in their smart homes, a model was developed and tested with multiple linear regression. A total of 306 participants participated in the survey with measurement items, out of which 121 had already been using IoT devices in their smart homes. The results show that users’ awareness of data breaches, ransomware attacks, personal information access breaches, and device vulnerabilities have an effect on IoT security importance. On the other hand, users often do not check their security settings and feel safe while using IoT devices. This paper provides an overview of users’ perception of security while using IoT devices, and can help developers build better devices and help raise awareness of security among users.
APA, Harvard, Vancouver, ISO, and other styles
20

Jiang, Dawei, and Guoquan Shi. "Research on Data Security and Privacy Protection of Wearable Equipment in Healthcare." Journal of Healthcare Engineering 2021 (February 5, 2021): 1–7. http://dx.doi.org/10.1155/2021/6656204.

Full text
Abstract:
With the close integration of science and technology and health, the broad application prospects of healthy interconnection bring revolutionary changes to health services. Health and medical wearable devices can collect real-time data related to user health, such as user behavior, mood, and sleep, which have great commercial and social value. Healthcare wearable devices, as important network nodes for health interconnection, connect patients and hospitals with the Internet of Things and sensing technology to form a huge medical network. As wearable devices can also collect user data regardless of time and place, uploading data to the cloud can easily make the wearable device’s system vulnerable to attacks and data leakage. Defects in technology can sometimes cause problems such as lack of control over data flow links in wearable devices, and data and privacy leaks are more likely to occur. In this regard, how to ensure the data security and user privacy while using healthcare wearable devices to collect data is a problem worth studying. This article investigates data from healthcare wearable devices, from technical, management, and legal aspects, and studies data security and privacy protection issues for healthcare wearable devices to protect data security and user privacy and promote the sustainable development of the healthcare wearable device industry and the scientific use of data collection.
APA, Harvard, Vancouver, ISO, and other styles
21

Al_Dosary, Duaa, Khattab M. Ali Alheeti, and Salah Sleibi Al-Rawi. "ICMetric Security System for Achieving Embedded Devices Security." Journal of Physics: Conference Series 1804, no. 1 (February 1, 2021): 012102. http://dx.doi.org/10.1088/1742-6596/1804/1/012102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Matheu, Sara N., Alberto Robles Enciso, Alejandro Molina Zarca, Dan Garcia-Carrillo, José Luis Hernández-Ramos, Jorge Bernal Bernabe, and Antonio F. Skarmeta. "Security Architecture for Defining and Enforcing Security Profiles in DLT/SDN-Based IoT Systems." Sensors 20, no. 7 (March 28, 2020): 1882. http://dx.doi.org/10.3390/s20071882.

Full text
Abstract:
Despite the advantages that the Internet of Things (IoT) will bring to our daily life, the increasing interconnectivity, as well as the amount and sensitivity of data, make IoT devices an attractive target for attackers. To address this issue, the recent Manufacturer Usage Description (MUD) standard has been proposed to describe network access control policies in the manufacturing phase to protect the device during its operation by restricting its communications. In this paper, we define an architecture and process to obtain and enforce the MUD restrictions during the bootstrapping of a device. Furthermore, we extend the MUD model with a flexible policy language to express additional aspects, such as data privacy, channel protection, and resource authorization. For the enforcement of such enriched behavioral profiles, we make use of Software Defined Networking (SDN) techniques, as well as an attribute-based access control approach by using authorization credentials and encryption techniques. These techniques are used to protect devices’ data, which are shared through a blockchain platform. The resulting approach was implemented and evaluated in a real scenario, and is intended to reduce the attack surface of IoT deployments by restricting devices’ communication before they join a certain network.
APA, Harvard, Vancouver, ISO, and other styles
23

Wang, Lei, Yalong Li, Xinyuan Tian, and Deyun Mo. "A design of the lightweight key management system for multi-level embedded devices." Applied Mathematics and Nonlinear Sciences 7, no. 2 (July 1, 2022): 1093–104. http://dx.doi.org/10.2478/amns.2021.2.00319.

Full text
Abstract:
Abstract Embedded devices often face security risks such as device loss, cracking, key disclosure and side-channel attacks. Owing to the relative meagreness characterising the availability of computing as well as storage resources, it might be said that embedded devices themselves have limited resources, and traditional key management solutions are thus not fully suitable for embedded device usage scenarios. In addition, embedded device key management also necessitates consideration of the dynamic changes of devices, such as device joining and withdrawal, and blacklist management and control. A lightweight key management scheme is proposed for multi-layer embedded devices, and the management and control problems of the device blacklist library are analysed and an optimisation scheme is proposed. Finally, the scheme of this paper is analysed in detail based on the aspects of security and resource overhead. Compared with the traditional key management scheme, the scheme designed in this paper can be better applied to the communication of embedded devices to meet the security requirements of embedded systems.
APA, Harvard, Vancouver, ISO, and other styles
24

Toka, K. O., Y. Dikilitaş, T. Oktay, and A. Sayar. "SECURING IOT WITH BLOCKCHAIN." International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVI-4/W5-2021 (December 23, 2021): 529–32. http://dx.doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-529-2021.

Full text
Abstract:
Abstract. IoT is becoming ubiquitous in industry, homes, cities, literally in every aspect of our daily lives. Securing IoT-based systems is difficult because of deficiencies in the very nature of IoT devices such as limited battery power, processing, and storage, etc. Blockchain is a new approach used to securely record transactions and offers potential solutions to computer and internet security issues such as confidentiality, integrity, availability, authentication, authorization, and accountability. Blockchain, as a decentralized ledger consisting of interconnected blocks, can remedy most of the security deficiencies of heavily IoT based systems. The Hyperledger Fabric blockchain network used in this study provides confidentiality, data integrity, authentication, and data security for data obtained from IoT devices. Widely used IoT data transfer MQTT protocol is included in the proposed approach. The approach is demonstrated in a simple demo Hyperledger network with simulated IoT devices. The proposed approach is discussed in terms of network security dimensions. Based on the features of the Hyperledger Blockchain network, it is displayed that the IoT security deficiencies can largely be remedied with the proposed approach.
APA, Harvard, Vancouver, ISO, and other styles
25

Sinda, Matt, Tyler Danner, Sean O'Neill, Abeer Alqurashi, and Haeng-Kon Kim. "Improving the Bluetooth Hopping Sequence for Better Security in IoT Devices." International Journal of Software Innovation 6, no. 4 (October 2018): 117–31. http://dx.doi.org/10.4018/ijsi.2018100109.

Full text
Abstract:
The Internet of Things (IoT) is becoming more pervasive in our daily lives and is being used to add conveniences to our everyday items. There are several standards that are allowing these devices to communicate with each other and ultimately, with our mobile devices. However, in a rush to meet market demand, security was not considered until after the device had already been placed on the market. Most of the work done in improving security has been in the area of encryption. However, with the relatively small footprint of IoT devices, this makes strong encryption difficult. The authors' method will show that the current algorithm used to determine the next Bluetooth frequency hop is vulnerable to attack, and will suggest a novel algorithm to more securely select the next frequency to use. They will simulate their solution algorithmically to showcase their approach and in so doing demonstrate that it moves to the next frequency in a more random pattern than the existing model achieves. In this article, the authors present a new framework for improving security that focuses on the timing of frequency hopping, particularly in Bluetooth. The results show that focusing on different timing sequences for how long a device stays on a particular frequency both fits the current Bluetooth Lite architecture and provides adequate security for IoT devices, as it is demonstrably more random that the existing architecture.
APA, Harvard, Vancouver, ISO, and other styles
26

Chang, Milton, Santanu Das, Dale Montrone, and Tapan Chakraborty. "Systems for Implementing Data Communication with Security Tokens." International Journal of High Speed Electronics and Systems 29, no. 01n04 (March 2020): 2040012. http://dx.doi.org/10.1142/s0129156420400121.

Full text
Abstract:
This paper proposes a novel scheme for inter-connecting IOT devices with servers. To overcome the drawbacks and other shortcomings of existing IoT network schemes, a new approach to IoT device certification and inter-connecting IoT devices to other network devices (e.g., aggregators and servers) is described. The proposed approach ensures that the overall IoT network is “hardened” against attack and meets the stringent requirements of mission critical applications.
APA, Harvard, Vancouver, ISO, and other styles
27

M G, Padmashree, Mallikarjun J P, Arunalatha J S, and Venugopal K R. "MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet of Things." International journal of Computer Networks & Communications 13, no. 6 (September 30, 2021): 19–39. http://dx.doi.org/10.5121/ijcnc.2021.13602.

Full text
Abstract:
The Internet of Things (IoT) is an extensive system of networks and connected devices with minimal human interaction and swift growth. The constraints of the System and limitations of Devices pose several challenges, including security; hence billions of devices must protect from attacks and compromises. The resource-constrained nature of IoT devices amplifies security challenges. Thus standard data communication and security measures are inefficient in the IoT environment. The ubiquity of IoT devices and their deployment in sensitive applications increase the vulnerability of any security breaches to risk lives. Hence, IoT-related security challenges are of great concern. Authentication is the solution to the vulnerability of a malicious device in the IoT environment. The proposed Multi-level Elliptic Curve Cryptography based Key Distribution and Authentication in IoT enhances the security by Multi-level Authentication when the devices enter or exit the Cluster in an IoT system. The decreased Computation Time and Energy Consumption by generating and distributing Keys using Elliptic Curve Cryptography extends the availability of the IoT devices. The Performance analysis shows the improvement over the Fast Authentication and Data Transfer method.
APA, Harvard, Vancouver, ISO, and other styles
28

Oser, Pascal, Rens W. van der Heijden, Stefan Lüders, and Frank Kargl. "Risk Prediction of IoT Devices Based on Vulnerability Analysis." ACM Transactions on Privacy and Security 25, no. 2 (May 31, 2022): 1–36. http://dx.doi.org/10.1145/3510360.

Full text
Abstract:
Internet of Things (IoT) devices are becoming more widespread not only in areas such as smart homes and smart cities but also in research and office environments. The sheer number, heterogeneity, and limited patch availability provide significant challenges for the security of both office networks and the Internet in general. The systematic estimation of device risks, which is essential for mitigation decisions, is currently a skill-intensive task that requires expertise in network vulnerability scanning, as well as manual effort in firmware binary analysis. This article introduces SAFER, 1 the Security Assessment Framework for Embedded-device Risks, which enables a semi-automated risk assessment of IoT devices in any network. SAFER combines information from network device identification and automated firmware analysis to estimate the current risk associated with the device. Based on past vulnerability data and vendor patch intervals for device models, SAFER extrapolates those observations into the future using different automatically parameterized prediction models. Based on that, SAFER also estimates an indicator for future security risks. This enables users to be aware of devices exposing high risks in the future. One major strength of SAFER over other approaches is its scalability, achieved through significant automation. To demonstrate this strength, we apply SAFER in the network of a large multinational organization, to systematically assess the security level of hundreds of IoT devices on large-scale networks. Results indicate that SAFER successfully identified 531 out of 572 devices leading to a device identification rate of 92.83 %, analyzed 825 firmware images, and predicted the current and future security risk for 240 devices.
APA, Harvard, Vancouver, ISO, and other styles
29

Zeng, Wen Ying, and Yue Long Zhao. "Mobile Storage and Data Security Management Research." Applied Mechanics and Materials 325-326 (June 2013): 1661–64. http://dx.doi.org/10.4028/www.scientific.net/amm.325-326.1661.

Full text
Abstract:
The mobile storages especially in mobile devices hold a lot of important and private data. The portability and mobility may lead to loss and theft, therefore security problem of mobile storages and mobile data may suffer from troublesome and damage. TCG provides TPM for trust and security management. It is insufficient with mobile storage devices because mobile storage devices are often separated and load with heterogeneity and massive data. The paper analyzes the security management of mobile storages, proposed practical mobile storage and data security management methods and mechanisms, and illustrates mobile storages integration schemes for single storage device and multiple storages devices and cloud storage. The overall mobile storage and data security policies and methods should be performed urgently.
APA, Harvard, Vancouver, ISO, and other styles
30

Thoutam, Vivek. "Unique Security Challenges of Iot Devices and Spectrum of Security Considerations." International Journal of Information technology and Computer Engineering, no. 11 (September 30, 2021): 15–21. http://dx.doi.org/10.55529/ijitc.11.15.21.

Full text
Abstract:
Besides prospective security layout lacks, the sizable rise in the amount in addition to characteristics of IoT resources could bring up the possibilities of the strike. When paired in addition to the highly connected quality of IoT devices, every improperly safeguarded device that is hooked up online likely affects the security and likewise durability of the Internet around the world, not just in your area. As an example, a prone refrigerator or even television in the USA that is tainted along with malware could send bunches of harmful spam e-mails to receivers globally utilizing the proprietor's house Wi- Fi Internet web link.
APA, Harvard, Vancouver, ISO, and other styles
31

Thoutam, Vivek. "Unique Security Challenges Of Iot Devices And Spectrum Of Security Considerations." Journal of Artificial Intelligence, Machine Learning and Neural Network, no. 12 (November 12, 2021): 1–7. http://dx.doi.org/10.55529/jaimlnn.12.1.7.

Full text
Abstract:
Besides prospective security layout lacks, the sizable rise in the amount in addition to characteristics of IoT resources could bring up the possibilities of the strike. When paired in addition to the highly connected quality of IoT devices, every improperly safeguarded device that is hooked up online likely affects the security and likewise durability of the Internet around the world, not just in your area. As an example, a prone refrigerator or even television in the USA that is tainted along with malware could send bunches of harmful spam e-mails to receivers globally utilizing the proprietor's house Wi-Fi Internet web link.
APA, Harvard, Vancouver, ISO, and other styles
32

Chiasson, Sonia, Heather Crawford, Serge Egelman, and Pourang Irani. "Reflections on U-PriSM 2." International Journal of Mobile Human Computer Interaction 6, no. 2 (April 2014): 73–78. http://dx.doi.org/10.4018/ijmhci.2014040106.

Full text
Abstract:
The Second Usable Privacy and Security for Mobile Devices Workshop (U-PriSM 2) was co-located with MobileHCI'13 in Munich, Germany. The U-PriSM 2 was an opportunity for researchers and practitioners to discuss research challenges and experiences around the usable privacy and security of mobile devices (smartphones and tablets). Security and privacy often involve having non-security experts, or even novice users, regularly making important decisions while their main focus is on other primary tasks. This is especially true for mobile devices where users can quickly and easily install apps, where user interfaces are minimal due to space constraints, and where users are often distracted by their environment. Likewise, mobile devices present unique privacy and security risks because they allow third-party applications access to personal information and sensor data. The amount and sensitivity of such personally identifying information is likely to increase as device functionality increases. The convergence of these factors means that improvements to security and privacy provisions on mobile devices are becoming increasingly important. Workshop participants had a chance to explore mobile device usage and the unique usable security and privacy challenges that arise, discuss proposed systems and ideas that address these needs, and work towards the development of design principles to inform future development in the area.
APA, Harvard, Vancouver, ISO, and other styles
33

Kodati, Sarangam, Kumbala Pradeep Reddy, Thotakura Veerananna, S. Govinda Rao, and G. Anil Kumar. "Security Framework Connection Assistance for IoT Device Secure Data communication." E3S Web of Conferences 309 (2021): 01061. http://dx.doi.org/10.1051/e3sconf/202130901061.

Full text
Abstract:
Today, Internet of Things (IoT) services has been increasing extensively because of their optimum device sizes and their developed network infrastructure that includes devices based on internet embedded with various sensors, actuators, communication, and storage components providing connection and data exchange. Presently number of industries use vast number of IoT devices, there are some challenges like reducing the risks and threats that exposure, accommodating the huge number of IoT devices in network and providing secure vulnerabilities have risen. Supervised learning has recently been gaining popularity to provide device classification. But this supervised learning became unrealistic as producing millions of new IoT devices each year, and insufficient training data. In this paper, security framework connection assistance for IoT device secured data communication is proposed. A multi-level security support architecture which combines clustering technique with deep neural networks for designing the resource oriented IoT devices with high security and these are enabling both the seen and unseen device classification. The datasets dimensions are reduced by considering the technique as auto encoder. Therefore in between accuracy and overhead classification good balancing is established. The comparative results are describes that proposed security system is better than remaining existing systems.
APA, Harvard, Vancouver, ISO, and other styles
34

Wakabayashi, Kiyoshi, Hiroyuki Kikuchi, Toshihiro Mori, Takamitsu Okada, and Yoshiro Koyama. "Safety Devices for Security Robots." Journal of the Robotics Society of Japan 29, no. 9 (2011): 777–79. http://dx.doi.org/10.7210/jrsj.29.777.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Harthorne, J. Warren. "Pacemakers and Store Security Devices." Cardiology in Review 9, no. 1 (January 2001): 10–17. http://dx.doi.org/10.1097/00045415-200101000-00004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

P.Musale, Vinayak, and S. S. Apte. "Security Risks in Bluetooth Devices." International Journal of Computer Applications 51, no. 1 (August 30, 2012): 1–6. http://dx.doi.org/10.5120/8003-1308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Sametinger, Johannes, Jerzy Rozenblit, Roman Lysecky, and Peter Ott. "Security challenges for medical devices." Communications of the ACM 58, no. 4 (March 23, 2015): 74–82. http://dx.doi.org/10.1145/2667218.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Neves, Ulysses Moreira, and Flávio Luis de Mello. "BYOD with Security." Journal of Information Security and Cryptography (Enigma) 5, no. 1 (January 27, 2019): 40. http://dx.doi.org/10.17648/jisc.v5i1.70.

Full text
Abstract:
<p class="IndexTerms">The concern of companies to keep sensitive data protected from improper access and information leaking has grown a lot. The constant cases of industrial espionage and information leakage regarding companies are an evidence of the need to apply strict information security policies, improve data protection and allow an auditing track. With the evolution of technology, the usage of personal mobile devices increased in organizations (BYOD - Bring Your Own Device), which allows the employees to use their own mobile devices at work. This paper addresses the current challenges faced by IT companies and teams in protecting access to this kind of information, and what strategies are used to mitigate, to track leaks, and reduce the misuse of documents in the organization. Considering the scenario evaluated, a framework with good Information Security practices based on the ISO 27002:2005 and the practical controls of the Center of Internet Security (CIS) is proposed, associating good practices with the needs of BYOD’s culture. The framework suggested in this paper reinforces the necessity for a standardization of the rules of information security in the process of adoption of BYOD’s culture, following the life cycle of the user with his personal mobile device in the company.</p><p class="IndexTerms"> </p><p class="IndexTerms"> </p>
APA, Harvard, Vancouver, ISO, and other styles
39

Ntwari, Richard, Annabella E. Habinka, and Fred Kaggwa. "Enhancing Bring Your Own Device Security in Education." Journal of Science & Technology 02, no. 04 (2021): 69–86. http://dx.doi.org/10.55662/jst.2021.2401.

Full text
Abstract:
The acceptance and use of personal devices at educational institutions is on the rise, resulting in the education sector’s adoption of Bring Your Own Device (BYOD). The institutions benefit from cost reduction in buying and managing IT devices as users purchase and bring their own devices. Users benefit by accessing learning materials and collaboration anytime, anywhere while on the move via institutional network. However, literature on BYOD indicates that various challenges are faced with usage of BYOD such as loss/stolen devices, malware, lack of policy, user negligence among others. This paper examined the literature in order to identify BYOD challenges, solutions, and guidelines that would inform secure BYOD usage in education.
APA, Harvard, Vancouver, ISO, and other styles
40

J G, Krithick, Nivedh T S, Siva Bharath S, Dr Radhamani A. S, and V. Ramanathan. "DATA SECURITY IN HEALTHCARE USING IOT." International Journal of Engineering Applied Sciences and Technology 7, no. 3 (July 1, 2022): 79–82. http://dx.doi.org/10.33564/ijeast.2022.v07i03.011.

Full text
Abstract:
While the Internet of Things (IoT) has been instrumental in healthcare data transmission, it also presents vulnerabilities and security risks to patients’ personalized health information for remote medical treatment. Currently most published security solutions available for healthcare data don't seem to be focused on data flow all the way from IoT sensor devices placed on a patient’s body through network routers to doctor’s offices. In this project, the IoT network facilitates healthcare data transmission for remote medical treatment, explored security risks related to unsecured data transmission, especially between IoT sensor devices and network routers, then proposed an encrypted security solution initiated at IoT sensor devices. Our proposed solution provides a cryptography algorithm embedded into the sensor device such that packets generated with patient’s health data are encrypted right at the sensor device before being transmitted. The proof of concept has been verified employing a lab setup with two level encryption at the IoT sensor level and two level decryption at the receiving end at the doctor’s office. Test results are promising for an end to-end security solution of healthcare data transmission in IoT. This project also provides further research avenues on IoT sensor driven security.
APA, Harvard, Vancouver, ISO, and other styles
41

Hewitt, Barbara, and Garry White. "Factors Influencing Security Incidents on Personal Computing Devices." Journal of Organizational and End User Computing 33, no. 4 (July 2021): 185–208. http://dx.doi.org/10.4018/joeuc.20210701.oa9.

Full text
Abstract:
Organizations expect their employees to connect securely to the organization's computer systems. Often these employees use their personal computers to access the organization's networks. This research explores whether these same employees apply protective security measures to their personal computers. Perhaps these employees behave riskily based on their optimistic bias. Results indicate that while cyber optimistic bias and perceived vulnerability influence individuals to apply more protective security measures, the users still experienced security incidents. Thus, organization are vulnerable to cyber-attacks if they are allowing employees to use personal computers to access these databases.
APA, Harvard, Vancouver, ISO, and other styles
42

Su, Xin, Ziyu Wang, Xiaofeng Liu, Chang Choi, and Dongmin Choi. "Study to Improve Security for IoT Smart Device Controller: Drawbacks and Countermeasures." Security and Communication Networks 2018 (May 31, 2018): 1–14. http://dx.doi.org/10.1155/2018/4296934.

Full text
Abstract:
Including mobile environment, conventional security mechanisms have been adapted to satisfy the needs of users. However, the device environment-IoT-based number of connected devices is quite different to the previous traditional desktop PC- or mobile-based environment. Based on the IoT, different kinds of smart and mobile devices are fully connected automatically via device controller, such as smartphone. Therefore, controller must be secure compared to conventional security mechanism. According to the existing security threats, these are quite different from the previous ones. Thus, the countermeasures applied should be changed. However, the smart device-based authentication techniques that have been proposed to date are not adequate in terms of usability and security. From the viewpoint of usability, the environment is based on mobility, and thus devices are designed and developed to enhance their owners’ efficiency. Thus, in all applications, there is a need to consider usability, even when the application is a security mechanism. Typically, mobility is emphasized over security. However, considering that the major characteristic of a device controller is deeply related to its owner’s private information, a security technique that is robust to all kinds of attacks is mandatory. In this paper, we focus on security. First, in terms of security achievement, we investigate and categorize conventional attacks and emerging issues and then analyze conventional and existing countermeasures, respectively. Finally, as countermeasure concepts, we propose several representative methods.
APA, Harvard, Vancouver, ISO, and other styles
43

Kim, Jiyeon, Minsun Shim, Seungah Hong, Yulim Shin, and Eunjung Choi. "Intelligent Detection of IoT Botnets Using Machine Learning and Deep Learning." Applied Sciences 10, no. 19 (October 8, 2020): 7009. http://dx.doi.org/10.3390/app10197009.

Full text
Abstract:
As the number of Internet of Things (IoT) devices connected to the network rapidly increases, network attacks such as flooding and Denial of Service (DoS) are also increasing. These attacks cause network disruption and denial of service to IoT devices. However, a large number of heterogenous devices deployed in the IoT environment make it difficult to detect IoT attacks using traditional rule-based security solutions. It is challenging to develop optimal security models for each type of the device. Machine learning (ML) is an alternative technique that allows one to develop optimal security models based on empirical data from each device. We employ the ML technique for IoT attack detection. We focus on botnet attacks targeting various IoT devices and develop ML-based models for each type of device. We use the N-BaIoT dataset generated by injecting botnet attacks (Bashlite and Mirai) into various types of IoT devices, including a Doorbell, Baby Monitor, Security Camera, and Webcam. We develop a botnet detection model for each device using numerous ML models, including deep learning (DL) models. We then analyze the effective models with a high detection F1-score by carrying out multiclass classification, as well as binary classification, for each model.
APA, Harvard, Vancouver, ISO, and other styles
44

Wang, Jin, Chang Liu, Jiangpei Xu, Juan Wang, Shirong Hao, Wenzhe Yi, and Jing Zhong. "IoT-DeepSense: Behavioral Security Detection of IoT Devices Based on Firmware Virtualization and Deep Learning." Security and Communication Networks 2022 (March 18, 2022): 1–17. http://dx.doi.org/10.1155/2022/1443978.

Full text
Abstract:
Recently, IoT devices have become the targets of large-scale cyberattacks, and their security issues have been increasingly serious. However, due to the limited memory and battery power of IoT devices, it is hardly possible to install traditional security software, such as antivirus software for security defense. Meanwhile, network-based traffic detection is difficult to obtain the internal behavior states and conduct in-depth security analysis because more and more IoT devices use encrypted traffic. Therefore, how to obtain complex security behaviors and states inside IoT devices and perform security detection and defense is an issue that needs to be solved urgently. Aiming at this issue, we propose IoT-DeepSense, a behavioral security detection system of IoT devices based on firmware virtualization and deep learning. IoT-DeepSense constructs the real operating environment of the IoT device system to capture the fine-grained system behaviors and then leverages an LSTM-based IoT system behavior abnormality detection approach to effectively extract the hidden features of the system’s behavior sequence and enforce the security detection of the abnormal behavior of the IoT devices. The design and implementation of IoT-DeepSense are carried out on an independent Internet of things behavior detection server, without modifying the limited resources of IoT devices, and have strong scalability. The evaluation results show that IoT-DeepSense achieves a high behavioral detection rate of 92%, with negligible impact on the performance of IoT devices.
APA, Harvard, Vancouver, ISO, and other styles
45

Choi, Ye-Jin, Hee-Jung Kang, and Il-Gu Lee. "Scalable and Secure Internet of Things Connectivity." Electronics 8, no. 7 (July 3, 2019): 752. http://dx.doi.org/10.3390/electronics8070752.

Full text
Abstract:
The Internet of things (IoT) technology, which is currently considered the new growth engine of the fourth industrial revolution, affects our daily life and has been applied to various industrial fields. Studies on overcoming the limitations of scalability and stability in a centralized IoT operating environment by employing distributed blockchain technology have been actively conducted. However, the nature of IoT that ensures connectivity with multiple objects at any time and any place increases security threats. Further, it extends the influence of the cyber world into the physical domain, resulting in serious damage to human life and property. Therefore, we aim to study a method to increase the security of IoT devices and effectively extend them simultaneously. To this end, we analyze the authentication methods and limitations of traditional IoT devices and examine cases for improving IoT environments by using blockchain technology. Accordingly, we propose a framework that allows IoT devices to be securely connected and extended to other devices by automatically evaluating security using blockchain technology and the whitelist. The method proposed in this paper restricts the extension of devices vulnerable to security risks by imposing penalties and allows only devices with high security to be securely and quickly authenticated and extended without user intervention. In this study, we applied the proposed method to IoT network simulation environments and observed that the number of devices vulnerable to security was reduced by 48.5% compared with traditional IoT environments.
APA, Harvard, Vancouver, ISO, and other styles
46

Zendehdel, Ghazale Amel, Ratinder Kaur, Inderpreet Chopra, Natalia Stakhanova, and Erik Scheme. "Automated Security Assessment Framework for Wearable BLE-enabled Health Monitoring Devices." ACM Transactions on Internet Technology 22, no. 1 (February 28, 2022): 1–31. http://dx.doi.org/10.1145/3448649.

Full text
Abstract:
The growth of IoT technology, increasing prevalence of embedded devices, and advancements in biomedical technology have led to the emergence of numerous wearable health monitoring devices (WHMDs) in clinical settings and in the community. The majority of these devices are Bluetooth Low Energy (BLE) enabled. Though the advantages offered by BLE-enabled WHMDs in tracking, diagnosing, and intervening with patients are substantial, the risk of cyberattacks on these devices is likely to increase with device complexity and new communication protocols. Furthermore, vendors face risk and financial tradeoffs between speed to market and ensuring device security in all situations. Previous research has explored the security and privacy of such devices by manually testing popular BLE-enabled WHMDs in the market and generally discussed categories of possible attacks, while mostly focused on IP devices. In this work, we propose a new semi-automated framework that can be used to identify and discover both known and unknown vulnerabilities in WHMDs. To demonstrate its implementation, we validate it with a number of commercially available BLE-enabled enabled wearable devices. Our results show that the devices are vulnerable to a number of attacks, including eavesdropping, data manipulation, and denial of service attacks. The proposed framework could therefore be used to evaluate potential devices before adoption into a secure network or, ideally, during the design and implementation of new devices.
APA, Harvard, Vancouver, ISO, and other styles
47

Lopes, Ana Paula G., and Paulo R. L. Gondim. "Low-Cost Authentication Protocol for D2D Communication in m-Health with Trust Evaluation." Wireless Communications and Mobile Computing 2020 (October 27, 2020): 1–16. http://dx.doi.org/10.1155/2020/8876807.

Full text
Abstract:
Relay-assisted device-to-device (D2D) communication serves users at the edge of system coverage of 5G networks, enabling communication among sensors and patients’ mobile devices, and improving spectral and power efficiency. The security of D2D-based m-health applications requires attention due to the delicacy of the data treated in the collection, transmission, and storage of information on patients, whose devices must be adequately authenticated. However, traditional authentication and key agreement schemes are not suitable for D2D scenarios, since they might expose patients to security vulnerabilities and lead to an excessive use of resources. This article proposes a secure and lightweight scheme based on Shamir secret sharing for the mutual authentication of m-health devices in relay-assisted D2D communications, which provides security robustness and reduces resources (energy, processing) consumption. The manuscript also addresses the trustworthiness of devices involved in data relay and device discovery procedures.
APA, Harvard, Vancouver, ISO, and other styles
48

Rajendran, Jeyavijayan, Ramesh Karri, James B. Wendt, Miodrag Potkonjak, Nathan McDonald, Garrett S. Rose, and Bryant Wysocki. "Nano Meets Security: Exploring Nanoelectronic Devices for Security Applications." Proceedings of the IEEE 103, no. 5 (May 2015): 829–49. http://dx.doi.org/10.1109/jproc.2014.2387353.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Dutta-Roy, Amitava. "Nano meets security: Exploring nanoelectronic devices for security applications." Proceedings of the IEEE 103, no. 5 (May 2015): 822–28. http://dx.doi.org/10.1109/jproc.2015.2418512.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Solera-Cotanilla, Sonia, Mario Vega-Barbas, Jaime Pérez, Gregorio López, Javier Matanza, and Manuel Álvarez-Campana. "Security and Privacy Analysis of Youth-Oriented Connected Devices." Sensors 22, no. 11 (May 24, 2022): 3967. http://dx.doi.org/10.3390/s22113967.

Full text
Abstract:
Under the Internet of Things paradigm, the emergence and use of a wide variety of connected devices and personalized telematics services have proliferated recently. As a result, along with the penetration of these devices in our daily lives, the users’ security and privacy have been compromised due to some weaknesses in connected devices and underlying applications. This article focuses on analyzing the security and privacy of such devices to promote safe Internet use, especially by young people. First, the connected devices most used by the target group are classified, and an exhaustive analysis of the vulnerabilities that concern the user is performed. As a result, a set of differentiated security and privacy issues existing in the devices is identified. The study reveals that many of these vulnerabilities are related to the fact that device manufacturers often prioritize functionalities and services, leaving security aspects in the background. These companies even exploit the data linked to the use of these devices for various purposes, ignoring users’ privacy rights. This research aims to raise awareness of severe vulnerabilities in devices and to encourage users to use them correctly. Our results help other researchers address these issues with a more global perspective.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography